eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

211
active users

#hacktivist

0 posts0 participants0 posts today

It's probably a good idea to do another #introduction since people change over time, ideally.

I'm haui. I help people & build things that help people. Big #foss enthusiast, #sysadmin by day and #hacktivist at night.

I think all people (and animals) are born equal and should stay that way.

I oppose #capitalism and embrace alternative systems. I dont care about #corporatedemocracy and manipulated "free speech".

I want thirst, hunger and homelessness gone, for everyone, by any means necessary.

Via #MEDIAite @ 2:32pm ET on June 22, 2025

Multiple #SocialMedia watchdogs confirmed that an #Iranian-aligned #hacktivist group called “313 Team” claimed responsibility for a Distributed Denial-of-Service (#DDoS) attack on Trump’s #TruthSocial platform just hours after the U.S. strikes. Truth Social went down shortly after 8 p.m. ET on Saturday — moments after #Trump announced the strikes on his account.

#war #iran #nuclear #313Team

mediaite.com/media/news/irania

Mediaite · Iranian-Aligned Hackers Claim Responsibility for Attack on Trump’s Truth Social PlatformBy Joe DePaolo

Backdoor implant discovered on PyPI posing as debugging utility

A sophisticated malicious package named 'dbgpkg' was detected on PyPI, masquerading as a Python debugging utility. The package implants a backdoor on systems, enabling execution of malicious code and data exfiltration. It uses function wrapping techniques to evade detection and is believed to be part of a larger campaign possibly linked to a hacktivist group known as Phoenix Hyena. The campaign also includes other packages like 'discordpydebug' and 'requestsdev'. The attackers' motivation appears to be geopolitical, potentially related to the Russia-Ukraine conflict. The use of specific backdooring techniques and tools like Global Socket Toolkit indicates a high level of sophistication and an intent to establish long-term presence on compromised systems.

Pulse ID: 68264a9cb2b105513148d978
Pulse Link: otx.alienvault.com/pulse/68264
Pulse Author: AlienVault
Created: 2025-05-15 20:12:12

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.